Page 216 / 224 Scroll up to view Page 211 - 215
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
2
Glossary
December 2003, M-10041-01
DHCP
See
Dynamic Host Configuration Protocol.
DMZ
A Demilitarized Zone is used by a company that wants to host its own Internet
services without sacrificing unauthorized access to its private network.
The DMZ sits between the Internet and an internal network's line of defense,
usually some combination of firewalls and bastion hosts. Typically, the DMZ
contains devices accessible to Internet traffic, such as Web (HTTP) servers,
FTP servers, SMTP (e-mail) servers and DNS servers.
DNS
See
Domain Name Server.
domain name
A descriptive name for an address or group of addresses on the Internet.
Domain names are of the form of a registered entity name plus one of a
number of predefined top level suffixes such as .com, .edu, .uk, etc. For
example, in the address mail.NETGEAR.com, mail is a server name and
NETGEAR.com is the domain.
Domain Name Server
DNS. A Domain Name Server resolves descriptive names of network
resources (such as www.NETGEAR.com) to numeric IP addresses.
Dynamic Host
Configuration
Protocol
DHCP. An Ethernet protocol specifying how a centralized DHCP server can
assign network configuration information to multiple DHCP clients. The
assigned information includes IP addresses, DNS addresses, and gateway
(router) addresses.
ESP
Encapsulating Security Payload.
gateway
A local device, usually a router, that connects hosts on a local network to other
networks.
IETF
Internet Engineering Task Force. An open international community of
network designers, operators, vendors, and researchers concerned with the
evolution of the Internet architecture and the smooth operation of the Internet.
Working groups of the IETF propose standard protocols and procedures for
the Internet, which are published as RFCs (Request for Comment) at
www.ietf.org
.
IKE
Internet Key Exchange. An automated method for exchanging and managing
encryption keys between two VPN devices.
IP
Internet Protocol. The main internetworking protocol used in the Internet.
Used in conjunction with the Transfer Control Protocol (TCP) to form TCP/IP.
Page 217 / 224
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
Glossary
3
December 2003, M-10041-01
IP Address
A four-position number uniquely defining each host on the Internet. Ranges of
addresses are assigned by Internic, an organization formed for this purpose.
Usually written in dotted-decimal notation with periods separating the bytes
(for example, 134.177.244.57).
IPSec
Internet Protocol Security. IPSec is a series of guidelines for securing private
information transmitted over public networks. IPSec is a VPN method
providing a higher level of security than PPTP.
ISP
Internet service provider.
LAN
See
local area network.
LDAP
Lightweight Directory Access Protocol. A set of protocols for accessing
information directories. LDAP is based on the standards contained within the
X.500 standard, but is significantly simpler. And unlike X.500, LDAP
supports TCP/IP, which is necessary for any type of Internet access. Because
it's a simpler version of X.500, LDAP is sometimes called
X.500-lite.
local area network
LAN. A communications network serving users within a limited area, such as
one floor of a building. A LAN typically connects multiple personal
computers and shared network devices such as storage and printers. Although
many technologies exist to implement a LAN, Ethernet is the most common
for connecting personal computers.
MAC address
Media Access Control address. A unique 48-bit hardware address assigned to
every Ethernet node. Usually written in the form 01:23:45:67:89:ab.
Mbps
Megabits per second.
MSB
See
Most Significant Bit or Most Significant Byte.
MTU
See
Maximum Transmit Unit.
Maximum Transmit
Unit
The size in bytes of the largest packet that can be sent or received.
Most Significant Bit or
Most Significant Byte
MSB. The portion of a number, address, or field that is farthest left when
written as a single number in conventional hexadecimal ordinary notation.
The part of the number having the most value.
NAT
See
Network Address Translation.
Page 218 / 224
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
4
Glossary
December 2003, M-10041-01
NetBIOS
Network Basic Input Output System. An application programming interface
(API)
for sharing services and information on l
ocal-area networks
(LANs). Provides for communication between stations of a network where
each station is given a name. These names are alphanumeric names, 16
characters in length. NetBIOS is needed to run Microsoft networking
functions such as Network Neighborhood.
netmask
A number that explains which part of an IP address comprises the network
address and which part is the host address on that network. It can be
expressed in dotted-decimal notation or as a number appended to the IP
address. For example, a 28-bit mask starting from the MSB can be shown as
255.255.255.192 or as /28 appended to the IP address.
Network Address
Translation
A technique by which several hosts share a single IP address for access to the
Internet.
PKIX
See
Public Key Infrastructure.
packet
A block of information sent over a network. A packet typically contains a
source and destination network address, some protocol and length
information, a block of data, and a checksum.
PPP
See
Point-to-Point Protocol.
PPP over Ethernet
PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the
Internet over an always-on connection by simulating a dial-up connection.
PPTP
Point-to-Point Tunneling Protocol. A method for establishing a virtual private
network (VPN) by embedding Microsoft’s network protocol into Internet
packets.
PSTN
Public Switched Telephone Network.
Point-to-Point
Protocol
PPP. A protocol allowing a computer using TCP/IP to connect directly to the
Internet.
Public Key
Infrastructure
PKIX. The most widely used standard for defining digital certificates. X.509
is actually an ITU Recommendation, which means that has not yet been
officially defined or approved. As a result, companies have implemented the
standard in different ways. For example, both Netscape and Microsoft use
X.509 certificates to implement SSL in their Web servers and browsers. But
an X.509 Certificate generated by Netscape may not be readable by Microsoft
products, and vice versa.
Page 219 / 224
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
Glossary
5
December 2003, M-10041-01
RFC
Request For Comment. Refers to documents published by the Internet
Engineering Task Force (IETF) proposing standard protocols and procedures
for the Internet. RFCs can be found at
www.ietf.org
.
RIP
See
Routing Information Protocol.
router
A device that forwards data between networks. An IP router forwards data
based on IP source and destination addresses.
Routing Information
Protocol
RIP. A protocol in which routers periodically exchange information with one
another so that they can determine minimum distance paths between sources
and destinations.
subnet mask
See
netmask.
URL
Universal Resource Locator, the global address of documents and other
resources on the World Wide Web.
UTP
Unshielded twisted pair. The cable used by 10BASE-T and 100BASE-Tx
Ethernet networks.
VPN
Virtual Private Network. A method for securely transporting data between two
private networks by using a public network such as the Internet as a
connection.
VPNC
Virtual Private Network Consortium. VPNC is the international trade
association for manufacturers in the VPN market. It should be noted that
VPNC does not create standards; instead, it strongly supports the current and
future IETF standards. See http://www.vpnc.org/ for more information.
WAN
See
wide area network.
wide area network
WAN. A long distance link used to extend or connect remotely located local
area networks. The Internet is a large WAN.
Windows Internet
Naming Service
WINS. Windows Internet Naming Service is a server process for resolving
Windows-based computer names to IP addresses. If a remote network
contains a WINS server, your Windows computers can gather information
from that WINS server about its local hosts. This allows your computers to
browse that remote network using Network Neighborhood.
WINS
See
Windows Internet Naming Service.
Page 220 / 224
Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
6
Glossary
December 2003, M-10041-01

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top